Special Section on Wireless networking

نویسندگان

  • M Deruyck
  • E Tanghe
  • W Joseph
  • L Martens
چکیده

In this Special Section on Wireless networking, we are pleased to present a diverse set of papers covering a range of topics within the area of wireless networking. While the huge proliferation of wireless devices and technologies enables a rich set of new applications, it also raises many new research challenges. This section addresses some of these open research challenges. The proliferation of wireless technologies has led to the coexistence of many different technologies nowadays, including sensor networks, WLAN, WiMAX and cellular networks among others. All these technologies are covered by the papers of this special section. Some of the applications addressed by the articles of this special section (such as vehicular network, industrial control or data aggregation) use one or more of these standard wireless technologies, while other applications addressed (such as underwater networks) require of specific hardware. The challenges faced by the papers of this section in the context of these wireless technologies and applications include security issues, network performance and energy consumption, among others. This special issue contains a selection of the best contributions presented at the 16th EuropeanWireless (EW) Conference that was held in Lucca in 2010. These include the keynote speeches given by Sajal Das and Michele Zorzi, which provided an insightful review of the fields covered as well as their own contribution in these fields, and five additional papers that have been selected because of their technical depth and novelty. All these papers have been substantially revised and extended for journal publication, and then subjected to the standard ComCom review process. We believe this process has resulted in a very strong set of papers for this special section. The first article, authored by S.K. Das and J.-W. Ho, is entitled ‘A Synopsis on Node Compromise Detection in Wireless Sensor Networks Using Sequential Analysis’ and deals with security in sensor networks. By exploiting the unattended nature of sensor networks, an attacker can physically capture and compromise sensor nodes and then launch a variety of attacks. In order to minimize the damage incurred by compromised and replicated nodes, it is very important to detect such malicious nodes as quickly as possible. This paper reviews the previous work of the authors on node compromise detection in sensor networks and provides an extended analysis against related work. To this end, they use the methodology of sequential analysis to detect static and mobile compromised nodes, as well as mobile replicated nodes in sensor networks. The second article of this special issue is ‘Protocol Design Issues in Underwater Acoustic Networks’ by P. Casari and M. Zorzi. This paper discusses issues related to the design of underwater acoustic network protocols which are tailored around, and leverage on, the differences between underwater acoustics and terrestrial radio. These differences span physical propagation and energy consumption, and influence the design of medium access control, routing and topology management. The authors introduce a set of solutions which explicitly account for the particular characteristics of underwater acoustics. Then, they review some more realistic underwater sound propagation behaviors and analyze their consequences on MAC protocols. Finally, they briefly discuss the currently available underwater communications hardware and comment on which paradigms are currently realizable. The third article is ‘Power-aware Opportunistic Downlink Scheduling in IEEE 802.16 Wireless Networks’ by C. Cicconetti, L. Lenzini, D. Migliorini and E. Mingozzi. This paper deals with two key challenges of 802.16-based networks. First, it proposes a framework based on a static partitioning of bandwidth into chunks with different transmission power levels and allocates higher amount of transmission power to terminals with impaired channel conditions. Second, it proposes a scheduling algorithm that aims at meeting both the QoS and fairness requirements, while taking into account the different power levels of the bandwidth chunks. The performance of the proposed approach is assessed through detailed packet level simulation in realistic scenarios and compared with well-known scheduling algorithms. The fourth article is entitled ‘Modelling and Optimization of Power Consumption in Wireless Access Networks’ and is authored by M. Deruyck, E. Tanghe, W. Joseph and L. Martens. This paper addresses power consumption of wireless access networks. It models power consumption of base stations for mobile WiMAX, fixed WiMAX, UMTS, HSPA, and LTE and introduces a new metric to compare the energy efficiency of the considered technologies for a range of bit rates. The study concludes that, for a 5 MHz channel, UMTS is the most energy-efficient technology until a bit rate of 2.8 Mbps, LTE between 2.8 Mbps and 8.2 Mbps, fixed WiMAX between 8.2 Mbps and 13.8 Mbps and mobile WiMAX for bit rates higher than 13.8 Mbps. The paper also investigates the influence of MIMO and deploys, based on the model, a tool for green wireless access networks. The fifth article is ‘The WICKPro protocol with the Packet Delivery Ratio metric’, authored by J. Aísa and J.L. Villarroel. It proposes a protocol for Wireless Mesh Networks with chain topologies that provide Hard Real-Time guarantees, which can be used for applications such as remote controlled machines in industrial control networks in road and railroad transportation or in tunnel and mine applications. The proposed approach is a MAC protocol based on the ideas of the Timed-token protocol and the cyclic executive. To validate it, the authors made a testbed using commercial

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices

Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and everything surrounding humans. To understand the advanced topics in wireless networks and IoT devi...

متن کامل

Guest Editorial: Special Issue on Wireless Computing and Networking

This special issue is devoted to the new research addressing challenges in the areas of wireless computing and networking. Wireless computing and networking has enabled heterogeneous access technologies for providing services to ubiquitous users. The demanding networking environment of wireless communications imposes many challenges, such as channel estimation, network protocol design, resource...

متن کامل

Special Section on Autonomic and Opportunistic Communications

It is our great pleasure to introduce this Special Section of the Journal, focused on Autonomic and Opportunistic Communications. We strongly believe autonomic and opportunistic properties will be a key feature of the Future Mobile Internet. The huge proliferation of mobile devices with wireless networking capabilities makes it possible to foresee a Future Internet environment in which users’ m...

متن کامل

Special Section on Parallel/Distributed Computing and Networking

The IEICE Transactions on Information and Systems announces a forthcoming Special Section on “Parallel and Distributed Computing and Networking” to be published in December, 2012. The objective of this special section is to publish and overview recent progress in the interdisciplinary area of Parallel and Distributed Computing and Networking. This special section will include papers based on th...

متن کامل

Special Issue on Security of Wireless Communication Systems

Wireless communication weaknesses are on the increase due to emergence of advanced services, the need of roaming, and the large deployment of mobile technologies. This has created challenging issues in the security of wireless systems and applications operating in wireless environments. The objective of the special issue is to seek for the development of new techniques, models and theories that...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011